Viewing and Configuring Wireless Services
249
For EAP with Transport Layer Security (EAP-TLS) clients, the format is
username
@
domain_name
. For example,
sydney@example.com
specifies the user sydney in the domain name example.com. The
*@marketing.example.com
glob specifies all users in the marketing
department at example.com. The user glob
sydney@engineering.example.com
specifies the user sydney in the
engineering department at example.com.
For a MAC address glob, type a full or partial username to be matched
during authentication. MAC addresses must be specified with colons as
the delimiters (for example, 00:11:22:33:44:55). You can use wildcards
by specifying an asterisk (*) in MAC addresses. The following lists
examples of using wildcards in MAC addresses:
* (all MAC addresses)
00:*
00:01:*
00:01:02*
00:01:02:03:*
00:01:02:03:04:*
00:01:02:03:04:0*
To view the access rules of a service profile, see “Viewing SSID Encryption
Settings and Access Rules” on page 268. To edit or create access rules for
a service profile, see “Modifying SSID Encryption Settings and Access
Rules” on page 269.
EAP Type (802.1X Only)
802.1X access rules include information
about the Extensible Authentication Protocol (EAP) type to use for AAA
communication between the client and the AAA server. The EAP type can
be one of the following:
EAP-MD5 Offload
—Extensible Authentication Protocol (EAP) with
message-digest algorithm 5. Select this protocol for wired
authentication clients.
Uses challenge-response to compare hashes.
Provides
no
encryption or integrity checking for the connection.
The EAP-MD5 option does not work with Microsoft wired authentication
clients.
Summary of Contents for OfficeConnect WX4400
Page 74: ...74 CHAPTER 4 WORKING WITH NETWORK PLANS...
Page 92: ...92 CHAPTER 5 PLANNING THE 3COM MOBILITY SYSTEM Origin point...
Page 164: ...164 CHAPTER 5 PLANNING THE 3COM MOBILITY SYSTEM...
Page 244: ...244 CHAPTER 6 CONFIGURING WX SYSTEM PARAMETERS...
Page 298: ...298 CHAPTER 7 CONFIGURING WIRELESS PARAMETERS...
Page 344: ...344 CHAPTER 8 CONFIGURING AUTHENTICATION AUTHORIZATION AND ACCOUNTING PARAMETERS...
Page 410: ...410 CHAPTER 14 MANAGING ALARMS...
Page 500: ...500 CHAPTER A CHANGING 3WXM PREFERENCES...
Page 516: ...516 CHAPTER B CHANGING 3WXM SERVICES PREFERENCES...
Page 522: ...522 APPENDIX C OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS...
Page 528: ...528 INDEX WX WX security enabling 67 X X 509 certificate types 383...